System Architecture

System Architecture

7404 bookmarks
Custom sorting
Mastodon and Open Graph
Mastodon and Open Graph
A few simple additions to make links to your site look better on Mastodon.
·leancrew.com·
Mastodon and Open Graph
How we built Order Editing
How we built Order Editing
This article covers how we adopted principles from the Git version control system and GitHub in our Order Editing API design.
·medusajs.com·
How we built Order Editing
Improved font fallbacks - Chrome Developers
Improved font fallbacks - Chrome Developers
The new `size-adjust` and font metric overrides allow developers to create font fallbacks that closely match web fonts. This reduces layout shifts.
·developer.chrome.com·
Improved font fallbacks - Chrome Developers
Bringing the best of Chrome to Android developers and users
Bringing the best of Chrome to Android developers and users
We’re announcing new features to Chrome Custom Tabs to give users the best of Chrome, and enable true multitasking between your app and the web.
·android-developers.googleblog.com·
Bringing the best of Chrome to Android developers and users
APIs explained in layman terms
APIs explained in layman terms
What is API ? What is Client-Server architecture ? What are the uses of APIs ?
·engineeringatscale.substack.com·
APIs explained in layman terms
The Ultimate Guide To Software Architecture Documentation
The Ultimate Guide To Software Architecture Documentation
This guide shows you how to write, structure, visualize and manage software architecture documentation in a lean way using appropriate documentation tools.
·workingsoftware.dev·
The Ultimate Guide To Software Architecture Documentation
GNUnet
GNUnet
GNU's framework for secure p2p networking
·gnunet.org·
GNUnet
Declarative Shadow DOM
Declarative Shadow DOM
We’re pleased to announce that support for the declarative shadow DOM API has been added and enabled by default in Safari Technology Preview 162.
·webkit.org·
Declarative Shadow DOM
A proposed threat model for confidential computing
A proposed threat model for confidential computing
The field of confidential computing is still in its infancy, to the point where it lacks a clear, agreed, and established problem description. Elena Reshetova and Andi Kleen from Intel recently started the conversation by sharing their view of a potential threat model in the form of this document, which is specific to the Intel Trust Domain Extension (TDX) on Linux, but which is intended to be applicable to other confidential-computing solutions as well. The resulting conversation showed that there is some ground to be covered to achieve a consensus on the model in the community.
·lwn.net·
A proposed threat model for confidential computing
Scaling Media Machine Learning at Netflix
Scaling Media Machine Learning at Netflix
We tackle some of the unique challenges of scaling multimodal machine learning models that operate on media assets (video, audio, and text).
·netflixtechblog.com·
Scaling Media Machine Learning at Netflix
HTML Tips
HTML Tips
In this article I’ll share some tips and advice about HTML.
·markodenic.com·
HTML Tips
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Find out what Istio is, how the Istio architecture works, which benefits Istio offers to Kubernetes and what to watch out for when getting started with Istio virtual services in a Kubernetes cluster.
·groundcover.com·
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Switching Techniques In Computer Networks - XALGORD
Switching Techniques In Computer Networks - XALGORD
Explore the various switching techniques used in computer networks including circuit switching, packet switching, flow control, and error control.
·xalgord.in·
Switching Techniques In Computer Networks - XALGORD